Skip to main content

CVE-2022-40871: n/a in n/a

Critical
VulnerabilityCVE-2022-40871cvecve-2022-40871
Published: Wed Oct 12 2022 (10/12/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Dolibarr ERP & CRM <=15.0.3 is vulnerable to Eval injection. By default, any administrator can be added to the installation page of dolibarr, and if successfully added, malicious code can be inserted into the database and then execute it by eval.

AI-Powered Analysis

AILast updated: 07/06/2025, 10:28:08 UTC

Technical Analysis

CVE-2022-40871 is a critical security vulnerability affecting Dolibarr ERP & CRM versions up to and including 15.0.3. The vulnerability is an Eval Injection (CWE-94), which allows an attacker with administrator privileges to inject and execute arbitrary code within the application. The issue arises because, by default, any administrator can be added via the installation page of Dolibarr. Once an attacker successfully adds an administrator account, they can insert malicious code into the database. This code is then executed through the use of the PHP eval() function, which evaluates a string as PHP code. Eval injection vulnerabilities are particularly dangerous because they allow remote code execution (RCE), potentially leading to full system compromise. The CVSS v3.1 base score is 9.8, indicating a critical severity with network attack vector, low attack complexity, no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability. Although no known exploits in the wild have been reported, the vulnerability's nature and ease of exploitation make it a significant threat. The lack of patch links suggests that users must rely on vendor updates or mitigations once available. This vulnerability affects the core Dolibarr ERP & CRM system, widely used for enterprise resource planning and customer relationship management, which often contains sensitive business data and operational workflows.

Potential Impact

For European organizations using Dolibarr ERP & CRM, this vulnerability poses a severe risk. Successful exploitation can lead to unauthorized full system control, data theft, data manipulation, and disruption of business operations. Given that Dolibarr is used to manage critical business functions such as finance, inventory, and customer data, a compromise could result in significant financial losses, reputational damage, and regulatory non-compliance, especially under GDPR requirements for data protection. The ability to execute arbitrary code remotely without authentication or user interaction increases the likelihood of automated attacks and widespread exploitation. Additionally, attackers could use compromised systems as pivot points for lateral movement within corporate networks, further escalating the impact. The absence of known exploits does not diminish the risk, as the vulnerability's characteristics make it a prime target for attackers once exploit code becomes publicly available.

Mitigation Recommendations

European organizations should immediately verify if they are running Dolibarr ERP & CRM version 15.0.3 or earlier. Until an official patch is released, organizations should restrict access to the Dolibarr installation page to trusted administrators only, ideally via network segmentation, VPNs, or IP whitelisting. Implement strict access controls and multi-factor authentication for administrative accounts to reduce the risk of unauthorized additions. Regularly audit user accounts and remove any suspicious or unauthorized administrator accounts. Monitor logs for unusual activity related to administrator creation or code execution. Disable or restrict the use of PHP eval() functions if possible, or apply application-level input validation and sanitization to prevent injection of malicious code. Organizations should stay alert for vendor patches or updates addressing this vulnerability and apply them promptly. Additionally, deploying web application firewalls (WAFs) with rules targeting eval injection patterns can provide temporary protection. Conducting penetration testing focused on this vulnerability can help identify exposure and validate mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-09-19T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec5e8

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 10:28:08 AM

Last updated: 8/12/2025, 4:19:34 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats